How does the proposed Ever Learning Censorware address the limitations of existing censorware systems, and what are its key components and functionalities?

The proposed Ever Learning Censorware addresses limitations of existing systems by continuously learning and adapting to new threats. It overcomes overblocking and underblocking issues by using a Bayesian classifier to evaluate the harm level of websites based on content keywords and their associated probabilities. Key components include:

  1. Blacklist: A list of domains and keywords with their harm levels.
  2. Classifier: A Bayesian classifier that categorizes domains and keywords as harmful, moderate, or harmless.
  3. Packet Capture Engine: Captures all network traffic, extracts domain/URLs, and sends them to the classifier for analysis.
  4. Recent Sites List: Stores recent harmful sites for improved performance, updated periodically to remove old entries.

The system uses Bayes theorem to calculate the probability of a website being harmful based on the presence of certain keywords. It also stores the latest content of critical components in stable storage to ensure data safety. The censorware is implemented in Java and uses libraries for network analysis and machine learning, ensuring compatibility across different operating systems.

Second International Conference on Networks and Advances in Computational Technologies: NetACT 19
Second International Conference on Networks and Advances in Computational Technologies: NetACT 19

Ljiljana Trajkovic, John Jose, J. Jayakumari, Maurizio Palesi

This book presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19) which took place on July 23-25, 2019 at Mar Baselios College of Engineering and Technology in Thiruvananthapuram, India. The conference was in association with Bowie State University, USA, Gannon University, USA and Malardalen University, Sweden. Papers presented were included in technical programs that were part of five parallel tracks, namely Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning. The proceedings brings together experts from industry, governments and academia from around the world with vast experiences in design, engineering and research.